Parents
Sign in to add mentorJohn Mitchell | grad student | 2006 | Stanford | |
(Formal analysis of security protocols: Protocol composition logic.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Datta A, Derek A, Mitchell JC, et al. (2013) Secure Protocol Composition Electronic Notes in Theoretical Computer Science. 83: 201-226 |
Roy A, Datta A, Derek A, et al. (2010) Inductive trace properties for computational security Journal of Computer Security. 18: 1035-1073 |
Datta A, Derek A, Mitchell JC, et al. (2007) Protocol Composition Logic (PCL) Electronic Notes in Theoretical Computer Science. 172: 311-358 |
Roy A, Datta A, Derek A, et al. (2007) Secrecy analysis in protocol composition logic Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4435: 197-213 |
Roy A, Datta A, Derek A, et al. (2007) Inductive proofs of computational secrecy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4734: 219-234 |
Datta A, Derek A, Mitchell JC, et al. (2006) Computationally sound compositional logic for key exchange protocols Proceedings of the Computer Security Foundations Workshop. 2006: 321-334 |
Backes M, Datta A, Derek A, et al. (2006) Compositional analysis of contract-signing protocols Theoretical Computer Science. 367: 33-56 |
Datta A, Derek A, Mitchell JC, et al. (2006) Games and the impossibility of realizable ideal functionality Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3876: 360-379 |
Datta A, Derek A, Mitchell JC, et al. (2005) A derivation system and compositional logic for security protocols Journal of Computer Security. 13: 423-482 |
He C, Sundararajan M, Datta A, et al. (2005) A modular correctness proof of IEEE 802.11i and TLS Proceedings of the Acm Conference On Computer and Communications Security. 2-15 |